6,518 Cybercrime jobs in India
Cybercrime Analyst
Posted today
Job Viewed
Job Description
Job Description:
We are seeking a highly skilled and motivated Digital Forensic Analyst to join our team. As a Digital Forensic Analyst, you will be responsible for conducting forensic examinations of digital devices and networks to uncover evidence related to cybercrimes, security breaches, and other digital incidents. You will play a crucial role in investigating and analyzing digital evidence to support legal proceedings, incident response efforts, and security operations.
Responsibilities:
- Perform forensic analysis of digital devices, including computers, mobile phones, servers, and network logs.
- Collect and preserve digital evidence using industry-standard forensic tools and techniques.
- Conduct examinations of digital media to identify, extract, and analyze relevant data, such as files, emails, chat logs, and internet history.
- Analyze malware and other malicious artifacts to determine their impact and origin.
- Document forensic findings and prepare detailed reports for use in legal proceedings and incident response activities.
- Collaborate with internal teams, law enforcement agencies, and external partners to provide expert guidance and support during investigations.
- Stay up-to-date with the latest developments in digital forensics, cyber threats, and forensic tools and methodologies.
- Provide expert testimony in court and other legal proceedings as needed.
Requirements:
- Bachelor's degree in Digital Forensics, Cybersecurity, or a related field. Advanced degree or certifications
- Proven experience in digital forensics, with a strong understanding of forensic principles, techniques, and tools.
- Proficiency in using forensic software and tools such as EnCase, FTK, X-Ways Forensics, Autopsy, and Volatility.
- Solid understanding of computer networks, operating systems, file systems, and data storage technologies.
- Experience in analyzing various types of digital evidence, including file systems, memory dumps, network traffic, and cloud data.
- Excellent analytical and problem-solving skills, with the ability to think critically and attention to detail.
- Strong written and verbal communication skills, with the ability to articulate technical concepts clearly and concisely.
Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Information Security Analyst
Posted today
Job Viewed
Job Description
About this role:
Wells Fargo is seeking a Information Security Analyst.
*In this role, you will: *
- Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented
- Maintain an awareness of bank security policies and government regulations pertaining to information security
- Review the development, testing, and implementation of security plans, products, and control techniques
- Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
- Investigate and recommend appropriate corrective actions for data security incidents
- Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes
- Provide security consulting and project management services on highly complex information security projects and issues
- Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
- Interact with internal customers
- Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements
*Required Qualifications: *
- 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
*Desired Qualifications: *
- Bachelor of Engineering Degree, preferably of Computer science or Information Technology
- 2+ years hands on experience on provisioning on Databases. Experienced on managing access, roles, and security of databases.
- Must have strong knowledge in/or SQL, Oracle, Teradata, Sybase and DB2 platforms.
- Must have hands-on experience on/or SQL Server Management Studio, SQL Developer, Teradata SQL Assistant, Sybase ASE, DB2
- Good to have any one Database Administration/Information Security certification (Security +, CISSP, CIAM)IAM vendor-based certifications (CyberArk, Oracle, IBM) certified.
- Knowledge and experience with any IAM, Provisioning, role management and certification tool
*Job Expectations: *
- Owns, tracks, and resolves database related incidents tickets submitted to Enterprise Access Management in the ServiceNow tool.
- Provides basic and complex technical support for routine security-related issues.
- Owns, tracks, and resolves database related project requests.
- Responds to Database related alerts and escalations during business hours; participates in a rotation schedule for providing after business hours support working with fellow Database Information Security Analysts, Database Administrators or Engineering staff to come up with strategic solutions to recurring problems. Shift timings: PM 3 Days Work from Office
Information Security Analyst
Posted today
Job Viewed
Job Description
Job Description – Information Security Analyst
Location: Remote / Bangalore
Shift: US Time Zone
Employment Type: Full-Time
About Scrut Automation
Scrut Automation is a leading security and compliance automation platform, helping organizations streamline compliance and strengthen their security posture across frameworks like ISO 27001, SOC 2, HIPAA, GDPR, CMMC, and FedRAMP. We work with fast-growing startups and enterprises worldwide, simplifying complex audits and enabling them to achieve certifications faster.
We are looking for an Information Security Analyst (1–3 years experience) with a strong foundation in compliance and a special focus on U.S. federal frameworks (CMMC and FedRAMP). This role is ideal for someone who is passionate about security frameworks, compliance readiness, and supporting U.S. customers through complex regulatory environments.
Key Responsibilities
- Support customer engagements across ISO 27001, SOC 2, HIPAA, GDPR, CMMC, and FedRAMP.
- Conduct gap assessments and readiness checks specifically for CMMC (Level 2/3) and FedRAMP Moderate/High.
- Assist customers in documenting controls, gathering evidence, and preparing for C3PAO assessments (CMMC) and 3PAO audits (FedRAMP).
- Review cloud security configurations (AWS, Azure, GCP) against CMMC and FedRAMP baselines.
- Maintain up-to-date knowledge of NIST 800-53, NIST , CMMC model, and FedRAMP requirements.
- Collaborate with clients to design remediation plans for identified gaps, ensuring controls are implemented effectively.
- Draft and maintain security documentation including SSPs (System Security Plans), POA&Ms (Plans of Action & Milestones), and incident response procedures.
- Act as a point of contact for U.S. clients, guiding them through compliance journeys with clear communication and actionable steps.
Qualifications
- 1–3 years of experience in information security, risk management, or compliance.
- Hands-on knowledge of ISO 27001, SOC 2, HIPAA, and GDPR frameworks.
- Demonstrated interest or experience in CMMC (NIST and FedRAMP (NIST compliance.
- Familiarity with security controls in cloud environments (AWS, Azure, GCP).
- Strong written and verbal communication skills for interfacing with U.S. clients.
- Preferred certifications: ISO 27001 LA, CISA, Security+, CCSK, or equivalent.
Why Join Scrut Automation?
- Build expertise in high-demand U.S. compliance frameworks (CMMC & FedRAMP).
- Work with global customers and cutting-edge cloud-native companies.
- Exposure to multiple frameworks and industry-leading compliance automation.
- Growth-focused culture with mentorship and fast learning opportunities.
- Competitive pay, benefits, and remote-first flexibility.
Information Security Analyst
Posted today
Job Viewed
Job Description
At NiCE, we don't limit our challenges. We challenge our limits. Always. We're ambitious. We're game changers. And we play to win. We set the highest standards and execute beyond them. And if you're like us, we can offer you the ultimate career opportunity that will light a fire within you.
So, what's theroleall about?
We are seeking a DLP Analyst to strengthen NiCE's data protection posture by monitoring, analyzing, and responding to data loss prevention alerts generated primarily through Microsoft Purview. The role bridges technical and business perspectives — reviewing violations, advising IT on configuration improvements, and engaging with business teams to address root causes of risky data handling.
We are looking for a Data Loss Prevention (DLP) Analyst to join our team and help us maintain and improve our data protection standards and posture.
As Data Loss Prevention (DLP) Analyst, you will support the DPO in playing a key role in privacy governance, risk management, and incident response, with a particular focus on Data Loss Prevention (DLP) monitoring and controls across the enterprise.
How will you make an impact?
- Monitor & Analyze: Review DLP alerts and violations in Microsoft Purview to identify trends, false positives, and potential data leakage risks
- Technical Feedback: Recommend threshold adjustments, rule refinements, and configuration changes to IT owners to improve detection accuracy and reduce alert fatigue
- Business Engagement: Liaise with business stakeholders to understand legitimate business needs driving DLP triggers (e.g., attempts to send sensitive data externally)
- Education & Awareness: Provide feedback to business units on secure data handling practices, raising awareness of policy and compliance obligations
- Incident Response Support: Escalate high-risk incidents to the Security Operations team and contribute to investigations as needed
- Continuous Improvement: Track and report on DLP effectiveness, emerging trends, and propose enhancements to policies, workflows, and training
Have you got what it takes?
- Experience with Microsoft Purview or other enterprise DLP solutions
- Strong analytical skills with the ability to distinguish between false positives and genuine data risks
- Understanding of data classification, data protection regulations (GDPR, NIS2, ISO 27001), and secure information handling
- Ability to engage both technical teams (IT, infrastructure) and business stakeholders (non-technical staff) effectively
- Excellent communication, presentation, and interpersonal skills
- A high level of integrity, professionalism, and confidentiality
- A proactive, collaborative, and problem-solving attitude
Certification Requirements
- Familiarity with other Microsoft 365 security and compliance tools (Defender, Sentinel).
- Knowledge of data governance and privacy frameworks.
- Relevant certifications (e.g., Microsoft Certified: Information Protection Administrator, ISO 27001, CISM, CIPP/E).
- Prior experience in a security operations, risk, or compliance team.
What's in it for you?
Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment As the market leader, every day at NiCE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NiCEr
Enjoy NiCE-FLEX
At NiCE, we work according to the NiCE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere.
Requisition ID: 8662
Reporting into: Director
Role Type: Individual Contributor
About NiCE
NICE Ltd. (NASDAQ: NICE) software products are used by 25,000+ global businesses, including 85 of the Fortune 100 corporations, to deliver extraordinary customer experiences, fight financial crime and ensure public safety. Every day, NiCE software manages more than 120 million customer interactions and monitors 3+ billion financial transactions.
Known as an innovation powerhouse that excels in AI, cloud and digital, NiCE is consistently recognized as the market leader in its domains, with over 8,500 employees across 30+ countries.
NiCE is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law.
Information Security Analyst
Posted today
Job Viewed
Job Description
Urgent Opening for Cyber security | Freshers | Navi Mumbai
Posting Title: Information Security Analyst (SOC)
Company Name: Inspiroz IT Services Pvt ltd
Job Location: Ghansoli, Mahape
Work Mode: Work from office
Job Description
The primary function of the SOC Associate is to analyse any incidents flagged by the Security Tools and undertake a detailed investigation of the Security Event. The SOC Associate shall determine whether the security event will be classified as an incident. They will be coordinating with the customer IT/ in house Managed services team for resolution of the Security Incident.
Responsibilities:
- Escalate validated and confirmed incidents to Managed Services team.
- Notify Account Managers of incident and required mitigation work.
- Fine-tune SIEM rules to reduce false positive and remove false negatives.
- Collect global threat intelligence and internal threats then inject actions based on analysis and recommendation.
- Proactively research and monitor security information to identify potential threats that may impact the organisation.
- Develop and distribute information and alerts on required corrective actions to the organisation.
- Learn new attack patterns, actively participate in security forums.
- Work closely on Vulnerability Assessment and coordinate with Managed services team.
- Understand the structure and the meaning of logs from different log sources such as FW, Servers, and End User Devices.
- Perform analysis and report breaches in Backup Compliance such as Barracuda, EMC Avamar, Datto.
- Perform threat intel research.
- Open and update incidents in ConnectWise Manage to report the alarms triggered or threats detected. Analysts should properly include for each incident on CW Manage all details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA.
- Track and update incidents and requests based on client's updates and analysis results.
Requirements
- Knowledge or hands-on experience of implementation and management of CrowdStrike Falcon, ConnectWise Manage, ConnectWise Automate, Windows AD, Linux and Infra technology.
- Experience with Security Information Event Management (SIEM) tools, creating advanced co-relation rules, administration of SIEM, system hardening, and Vulnerability Assessments.
- Should have expertise in TCP/IP network traffic and event log analysis.
- Knowledge and hands-on experience with Falcon CrowdStrike, ConnectWise Manage, Bit Defender Gravity would be nice to have.
- Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
- Configuration and Troubleshooting experience on Checkpoint, Cisco, FortiGate, Palo Alto and SonicWALL firewalls would be an added advantage.
- Knowledge of Scripting.
Timings for Shifts: (10 hrs Shift – 5 days working)
7:30 am - 5:30 pm
12:30 pm - 10:30 pm
7:30 pm - 5:30 am
9:30 pm - 7:30 am
Work Experience: 0 - 6 Months
Additional Skills: CCNA, MCP
Company Background:
Inspiroz IT Services Pvt Ltd - At Inspiroz IT, we solve technology challenges by providing unmatched expertise through strategy, implementation, and managed services. Inspiroz, IT provides ongoing support and maintenance services through a unique model that blends on site and remote support for existing IT infrastructure and devices to sustain their purpose and benefits. We partner with school leaders, educators and corporates to improve the way technology is used to drive transformational outcomes and achieve operational goals. With stable, portable and scalable IT, we prepare and support each technological environment through various phases of evolution and growth. We take a unique approach to the use of technology in schools and corporates. Our Customer Promise is to be Helpful, Responsive & Entrepreneurial.
Inspired by our core values of: Be Courageous, Extra Mile, Today, not Tomorrow, and Communicate, Communicate, Communicate.
For more information kindly visit on company website
Interested candidates can share their updated resume on email ID:
Note: Interview will be conducted face to face.
Job Types: Full-time, Permanent, Fresher
Benefits:
- Health insurance
- Provident Fund
Work Location: In person
Information Security Analyst
Posted today
Job Viewed
Job Description
2-3 Years Noida
Responsibilities
Perform manual penetration testing on networks, web-based and mobile applications
Run scheduled Nessus Scan and other network scans
Produce high-quality technical reports and presentations and suggest remediation for the vulnerabilities
Work closely with the development teams and support in fixing security vulnerabilities
Engage with prospective clients to understand in scope applications and plan out the assessment of their applications or infrastructure
Work as a single point of contact for existing and potential clients and manage internal and external VAPT assignments
Drive information security awareness and training to promote a secure environment and an effective security culture
Support and guide the VAPT team for internal and third-party VAPT assignments for web and mobile applications
Provide guidance to Junior security experts on complex projects that require your experience and expertise.
Support pre-sales and sales team with security-related RFP questionnaires and provide ad-hoc support to business units on security-related matters
Requirements
Strong fundamentals in network security, application security, and cloud security concepts and controls
Understanding of the Secure Software Development Life Cycle and DevSecOps principles
Must be updated with the latest security vulnerabilities
Good experience with mobile and web VAPT assignments and knowledge of OWASP top 10, WASC, SANS 25
Hands-on experience with BurpSuite, SqlMap, Nmap, Nessus, Kali Linux, and various paid open-source tools
Certifications such as CEH, OSCP, or any similar certification would be an added advantage
Self-directed technical lead, willing to take ownership and drive results, propose technical directions, make decisions and resolve issues
Excellent interpersonal skills, ability to navigate through challenging situations, and good analytical skills
Excellent verbal and written communication skills and the ability to interact with senior managers, subject matter experts, regulatory authorities, and client's Information Security Offices
Be The First To Know
About the latest Cybercrime Jobs in India !
Information Security Analyst
Posted today
Job Viewed
Job Description
Experience & Work Details
- Job Title:
Information Security Analyst - Experience:
years - Location:
Mohan Estate, Delhi, India (Work from Office) - Working Days/Hours:
Monday - Friday, 8:00 AM - 5:00 PM - Employment Type:
Full-time
About The Role
We are looking for a detail-oriented and proactive Information Security Analyst to join our team. The ideal candidate will play a critical role in safeguarding organizational data, ensuring compliance with industry standards, and supporting ongoing risk management initiatives.
Key Responsibilities
- Support ISO 27001 and SOC 2 Type II compliance, including audits and evidence collection.
- Conduct risk assessments, vulnerability scans, and security audits.
- Develop, implement, and monitor security policies and procedures.
- Manage vendor risk assessments and ensure data protection compliance.
- Draft and maintain security documentation (policies, agreements, terms of use).
- Collaborate with teams to embed Privacy by Design/Default in systems and processes.
- Recommend and implement risk mitigation measures.
Qualifications & Skills
- Bachelor's degree in Information Security, Computer Science, or a related field.
- 3-5 years of proven experience in information security, compliance, or risk management.
- Knowledge of ISO 27001, GDPR, and data protection best practices.
- Experience with vulnerability assessment tools, risk analysis frameworks, and incident response.
- Strong analytical and documentation skills.
- Ability to work effectively in a fast-paced, office-based environment.
Preferred Certifications (Having Them is a Plus)
- ISO 27001 Lead Implementer/Auditor
- CompTIA Security+, CISA, CISM, or equivalent
- Any other certification demonstrating job-related skills in information security, risk management, or compliance
Additional Skills/Experience
- Cloud Security: A
WS, Azure, or GCP controls. - Security Operations:
SIEM tools (Splunk, ELK, QRadar), incident response. - Compliance:
Exposure to HIPAA, PCI-DSS, NIST, or ISO 27701. - Testing:
Penetration testing & threat modeling. - Tools:
DLP and endpoint protection. - Soft Skills:
Strong communication; ability to explain risks in business terms.
Information Security Analyst
Posted today
Job Viewed
Job Description
Job Title: Information Security Analyst – Implementation Specialist
Experience: 2–3 Years
Location: Mohali
Reporting To: Information Security Manager / CISO
About the Role:
We are seeking an Information Security professional with 2–3 years of experience to expedite the implementation of security policies, compliance controls, and web application security measures in a testing and certification environment. The candidate will help ensure our labs, processes, and IT systems adhere to industry standards, regulatory requirements, and best practices such as OWASP Top 10.
Key Responsibilities:
- Implement and maintain information security policies, procedures, and controls aligned with ISO 27001 and other relevant standards.
- Conduct risk assessments and support remediation plans to ensure compliance with regulatory and client requirements.
- Ensure web applications, tools, and systems follow OWASP Top 10 security guidelines to mitigate common vulnerabilities.
- Coordinate with testing teams, labs, and IT to implement security controls without disrupting operations.
- Assist in internal and external audits related to information security and data protection.
- Support vulnerability management, access control, and security incident monitoring.
- Maintain documentation for security implementations, SOPs, and compliance reports.
- Provide guidance to teams on secure handling of sensitive data and regulatory compliance.
- Stay updated on regulatory changes, industry best practices, and emerging security threats.
Required Skills & Qualifications:
- Bachelor's degree in Computer Science, Information Security, or related field.
- 2–3 years of experience in information security, preferably in a regulated/testing/certification environment.
- Hands-on experience in implementing security policies, controls, and audits.
- Strong knowledge of web application security and experience implementing OWASP Top 10 recommendations.
- Familiarity with ISO 27001, ISO 9001, ISO 17025, NIST, GDPR, and other relevant standards.
- Understanding of IT systems, networks, cloud environments, and data protection principles.
- Strong documentation, analytical, and problem-solving skills.
- Certifications like ISO 27001 Lead Implementer, CISA, CISM, or CompTIA Security+ are a plus.
Desired Attributes:
- Proactive, detail-oriented, and able to expedite security implementations independently.
- Strong communication and coordination skills with cross-functional teams.
- Ability to work under pressure and meet strict deadlines in a compliance-focused environment.
- Passionate about information security, web application security, and regulatory compliance in testing and certification services.
Job Types: Full-time, Permanent
Pay: From ₹20,000.00 per month
Work Location: In person
Information Security Analyst
Posted today
Job Viewed
Job Description
Cohesity is the leader in AI-powered data security. Over 13,600 enterprise customers, including over 85 of the Fortune 100 and nearly 70% of the Global 500, rely on Cohesity to strengthen their resilience while providing Gen AI insights into their vast amounts of data. Formed from the combination of Cohesity with Veritas' enterprise data protection business, the company's solutions secure and protect data on-premises, in the cloud, and at the edge. Backed by NVIDIA, IBM, HPE, Cisco, AWS, Google Cloud, and others, Cohesity is headquartered in Santa Clara, CA, with offices around the globe.
We've been named a Leader by multiple analyst firms and have been globally recognized for Innovation, Product Strength, and Simplicity in Design , and our culture.
Want to join the leader in AI-powered data security?
We are seeking a highly skilled Security Engineer with strong expertise in Endpoint Detection & Response (EDR/XDR) tools (e.g., CrowdStrike Falcon), Security Information and Event Management (SIEM) platforms (e.g., Splunk, Google SecOps/Chronicle), Cloud Security across AWS, Azure, and GCP. The ideal candidate will have Deep investigation skills and cloud threat detection capabilities, Proven experience as Incident Commander during critical incidents, awareness of recent threats and adversarial techniques, Ability to quickly understand complex environments, Strong business and interpersonal skills to manage risks and collaborate with cross-functional teams
How You'll Spend Your Time Here
- Serve as a senior escalation point for high-severity alerts and incidents across on-prem, endpoint, and cloud workloads
- Perform deep-dive investigations into complex threats such as Cloud-native attacks, Malware and ransomware, Insider threats, Advanced Persistent Threat (APT) campaigns
- Correlate telemetry from EDR/XDR, SIEM, CSPM, and threat intel sources to detect sophisticated threats
- Lead Major Incident Response as Incident Commander, coordinating SOC, IR, Cloud, and IT teams
- Drive containment, eradication, and recovery for both on-premises and cloud security incidents
- Deliver comprehensive post-incident reports with actionable remediation guidance
- Lead and participate in Blue/Red team exercises to improve detection logic and align with MITRE ATT&CK
- Mentor SOC analysts and junior engineers in advanced investigations and cloud IR
- Review and update SOPs, protocols, and capabilities to address emerging threats
- Develop metrics and scorecards to measure Organizational risk, SOC operational effectiveness and efficiency
*WE'D LOVE TO TALK TO YOU IF YOU HAVE MANY OF THE FOLLOWING: *
- EDR/XDR: Strong hands-on experience with CrowdStrike Falcon
- SIEM: Expertise in Splunk and/or Google SecOps (Chronicle)
- Cloud Security: Skilled in cloud monitoring (AWS, Azure, GCP) and incident handling
- Incident Response: Proven track record as Incident Commander handling multi-vector incidents
- OS Knowledge: Deep understanding of Windows and Linux internals
- DLP Tools: Proficiency with MS Defender, Zscaler
- CSPM Tools: Familiarity with Wiz, Qualys, AWS Security Hub, Azure Defender, GCP SCC
- SOAR Platforms: Experience with Splunk SOAR, Google Siemplify
- Scripting: Python, PowerShell, or similar for automation (preferred)
Data Privacy Notice For Job Candidates
For information on personal data processing, please see our Privacy Policy
.
**Equal Employment Opportunity Employer (EEOE)
Cohesity is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status or any other category protected by law.
If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process, or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may contact us at COHESITY or
for assistance.
In-Office Expectations
Cohesity employees who are within a reasonable commute (e.g. within a forty-five (45) minute average travel time) work out of our core offices 2-3 days a week of their choosing.
Interested candidates based outside of the designated areas are welcome to apply, provided they have the right to work in the job location.